Berkeley CSUA MOTD:Entry 37302
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/26 [General] UID:1000 Activity:popular
5/26    

2005/4/21-22 [Computer/SW/Security, Computer/SW/OS/Windows] UID:37302 Activity:nil
4/21    Prank Paper accepted for publication:
        http://www.cnn.com/2005/EDUCATION/04/21/academic.hoax.ap/index.html
        \_ Wow, that only took CNN about 2 weeks to report.
        \_ Dude that's already been reported on motd:
           http://csua.com/?entry=37223
                \_ it's already been reported twice on the motd.
        \_ Conferences are just social gatherings.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/26 [General] UID:1000 Activity:popular
5/26    

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
	...
2011/2/14-4/20 [Computer/SW/Unix] UID:54039 Activity:nil
2/14    You sure soda isn't running windows in disguise?  It would explain the
        uptimes.
        \_ hardly, My winbox stays up longer.
        \_ Nobody cares about uptime anymore brother, that's what web2.0 has
           taught us.  Everything is "stateless".
           \_ You;d think gamers would care more about uptime.
	...
2010/8/12-9/7 [Computer/SW/Languages/Perl] UID:53922 Activity:nil
8/12    Ruby coders, do you mostly DIY your stuff or use the ruby libs out
        there?   How is their quality compared to other libs you have used
        for other langs?  Thx.
        \_ I use Ruby for hobby stuff, etc.  I use libraries for system stuff
           (web access, process, etc.) but that's about it.  Perl libraries are
           much better/more complete.  I assume because of the maturity and
	...
2010/2/22-3/12 [Computer/HW] UID:53723 Activity:nil
2/20    There was a failure validating the SSL/TLS certificate for the server
                                          <DEAD>mail.csua.berkeley.edu<DEAD>
        The reason for the failure was
                          self signed certificate in certificate chain (details)
        We have not verified the identity of your server. If you ignore this certificate validation
        problem and continue, you could end up connecting to an imposter server.
	...
Cache (3882 bytes)
www.cnn.com/2005/EDUCATION/04/21/academic.hoax.ap/index.html
BOSTON, Massachusetts (AP) -- Three MIT graduate students set out to show what kind of gobbledygook can pass muster at an academic conference the se days, writing a computer program that generates fake, nonsensical pap ers. The program, developed by students Jeremy Stribling, Max Krohn and Dan Ag uayo, generated a paper with the dumbfounding title: "Rooter: A Methodol ogy for the Typical Unification of Access Points and Redundancy." Its in troduction begins: "Many scholars would agree that, had it not been for active networks, the simulation of Lamport clocks might never have occur red." The program works like the old "Mad Libs" books, generating sentences tak en from real papers but leaving many words blank. It fills the blanks wi th random buzzwords common in computer science. And it adds to the veris imilitude with meaningless charts and graphs. Earlier this month, the students received word that the Ninth World Multi -Conference on Systemics, Cybernetics and Informatics, scheduled to take place in July in Orlando, Florida, had accepted the four-page "Rooter" paper. A second bogus submission -- "The Influence of Probabilistic Meth odologies on Networking" -- was rejected. The offer accepting a paper and inviting the students to present it in pe rson in Orlando was rescinded after word of the hoax got out, and the st udents were refunded the $390 fee to attend the conference and have the paper published in its proceedings. But they still hope to go, using the more than $2,000 raised in contribut ions to their prank, much of it from admirers who tested the program on the students' Web site. "We wanted to go down there and give a randomly generated talk," Striblin g said. E-mails to a conference address and to organizer Nagib Callaos were not i mmediately returned Wednesday, and there was no answer at the Orlando te lephone number listed under Callaos' name. According to e-mails sent to the students and information posted by Calla os on the conference Web site, reviewers detected several bogus submissi ons. But the reviewers provided no "formal feedback" on the second paper , so it was accepted as a "non-reviewed paper." Callaos said it would ha ve been unfair to reject a paper because there had been no feedback. Stribling doubts the paper fooled anyone who actually read it, which keep s the hoax a notch below a famous 1996 prank in which physicist Alan Sok al persuaded a Duke University journal called Social Text to publish a b ogus article titled "Transgressing the Boundaries: Towards a Transformat ive Hermeneutics of Quantum Gravity." But in addition to mocking academic jargon, the prank sheds light on what Stribling sees as a problem: conferences with low standards that pander to academics looking to pad their resumes, but which harm the reputatio ns of more reputable gatherings. "We certainly exposed this conference as being willing to publish any pap er regardless of whether it's been peer-reviewed, which is kind of a dan gerous precedent to set," Stribling said. "It's kind of dangerous to be able to pass anything off as scientifically valid." According to its Web site, the conference featured more than 2,900 papers last year, and a preliminary program for this year's event lists presen tations by researchers from numerous universities, including highly resp ected ones like Northwestern and the University of Texas, as well as com panies such as Intel Corp. But the conference has apparently been targeted by pranksters before. An Australian computer scientist, Justin Zobel, describes on his Web site three papers that were accepted without comment for the 2002 conference . One submission was purposefully nonsensical, another submission juxtapose d lines from two different papers, and the third tried unsuccessfully to sabotage itself by claiming, for instance, that the method proposed "do es not work at all."
Cache (3084 bytes)
csua.com/?entry=37223
reut/ CAMBRIDGE, Massachusetts (Reuters) -- In a victory for pranksters at the Massachusetts Institute of Technology, a bunch of computer-generated gib berish masquerading as an academic paper has been accepted at a scienti f ic conference. Jeremy Stribling said Thursday that he and two fellow M IT graduate studen ts questioned the standards of some academic conferen ces, so they wrote a computer program to generate research papers comple te with "context-fr ee grammar," charts and diagrams. The trio submitted two of the randomly assembled papers to the World Mult i-Conference on Systemics, Cybernetics and Informatics (WMSCI), schedule d to be held Ju ly 10-13 in Orlando, Florida. To their surprise, one of the papers -- "R ooter: A Methodology for the Ty pical Unification of Access Points and R edundancy" -- was accepted for p resentation. The prank recalled a 1996 hoax in which New York University physicist Ala n Sokal succeeded in get ting an entire paper with a mix of truths, false hoods, non sequiturs an d otherwise meaningless mumbo-jumbo published in the quarterly journal S ocial Text, published by Duke University Press. Stribling said he and hi s colleagues only learned about the Social Text a ffair after submitting their paper. "Rooter" features such mind-bending gems as: "the model fo r our heuristic consists of four independent components: simulated annea ling, active ne tworks, flexible modalities, and the study of reinforcem ent learning" an d "We implemented our scatter/gather I/O server in Simu la-67, augmented with opportunistically pipelined extensions." Stribling said the trio targeted WMSCI because it is notorious within the field o f computer science for sending copious e-mails that solicit admi ssions to the conference. which ex ist only to make money," explained Stribling and his cohorts' website, " SCIgen - An Automatic CS Paper Generator." "Our aim is to maximize amusement, rather than coherence," it said. The w ebsite allows users to "Generate a Random Paper" themselves, with fiel ds for inserting "optional author names." " Nagib Callaos, a conference organizer, said the paper was one of a small number accepted on a "non-r eviewed" basis -- meaning that reviewers had not yet given their feedbac k by the acceptance deadline. "We thought that it might be unfair to ref use a paper that was not refuse d by any of its three selected reviewers ," Callaos wrote in an e-mail. " The author of a non-reviewed paper has complete responsibility of the co ntent of their paper." However, Callao s said conference organizers were reviewing their acceptan ce procedures in light of the hoax. Asked whether he would disinvite the MIT students , Callos replied, "Bogus papers should not be included in the conference program." Stribling said conference organizers had not yet formally res cinded their invitation to present the paper. The students were soliciti ng cash donations so they could attend the conf erence and give what Str ibling billed as a "completely randomly-generate d talk, delivered entir ely with a straight face."